SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
New Context protects data and the movement of data in
highly regulated industries
PREPARED FOR:
Using Security Orchestration in Utility Networks to create
an Agile Threat Response and Enhance Resiliency
EnergySec Security and Compliance Summit 2019
August 19-21, 2019
20+ years security & product experience.
Advocacy on security appears in CNBC, Forbes, and NYT.
Previously CloudPassage, nCircle, and Tripwire.
San Francisco
Andrew Storms, CISSP
VP, Product at New Context
@St0rmz
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf
The time from the attacker’s
first action in an event chain to
the initial compromise of an
asset is typically measured in
minutes
Breach
00:00:00
56% of breaches took months
or longer to discover
Detection
56%
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
53 % have no idea how well the
tools and software
implemented in corporate
networks are performing.Functional
53%
https://go.attackiq.com/PR-2019-PONEMON-REPORT_LP.html
63% said they have experienced
a security control reporting a
threat blocked when in reality,
the tool failed to stop malicious
behavior.Failure
63%
Speed Measure and Learn
Speed to assess and react is key
Humans may take too long to analyze the situation
Humans don’t scale well against machines
Trust but verify
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
Agile Response System System Components Response Types Risks Metrics
TOPICS
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
TERMINOLOGY
• Indicators
Things I’m looking for
Egress traffic on port 666
• Observables
Things I saw
Traffic on port 666 src myIP
dest outsideIP
• Actuator
Component that is responsible for taking action
Block traffic at firewall on
port 666
STOTS
FIT
STIG
TMA
AGILE RESPONSE SYSTEM COMPONETS
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
Automation
Machine to machine
communications
Interoperate
Common data
structures
Adapt behaviors
Contextual awareness
Secure and trusted
Confidentiality, integrity,
and availability
Measure and improve
Feedback loops
Take action
Actuators
AGILE RESPONSE SYSTEM COMPONETS
• Structured Threat Observable Tool Set (STOTS)
• Structured Threat Information Expression (STIX)
• STOTS focus on surgical detection and response
for a specific threat, enabling cyber defenders to
be more agile in defense against cyber
adversaries.
• Detection and monitoring that can be used by
the most advanced and the most basic cyber
personnel to find IOCs for configuration specific
systems.
Common data
structures
Creative Destruction and Agnostic Detection
using a Structured Threat Observable Tool Set
Bryce McClurg | Idaho National Laboratory
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
Machine to machine
communications
Contextual awareness
AGILE RESPONSE SYSTEM COMPONETS
• Use of STIX and ELK to quickly discover potentially
malicious activity.
• Vendor agnostic means to achieve these goals in
addition to providing a means to share these findings.
• Leveraging off the shelf big data tools
such as Elasticsearch.
• Facilitate rapid querying of complex STIX observables.
STIX and Big Data
Christian O. Hunt | New Context Services
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
Common data
structures
Machine to machine
communications
Contextual awareness
AGILE RESPONSE SYSTEM COMPONETS
• Threat Monitoring Appliance (TMA)
• Test harness toolset for STIX based observables and
indicators.
• Runs inside OT networks and executes the responses
• Developed by New Context as part of the California
Energy for the 21st Century (CES-21) project.
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
Actuators Feedback loops
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
• Address the asset entire
lifecycle with automation
• 3/4ths of the PF curve
happen prior to failure
• Take an automation-first
approach
• Capture metrics from day 1
AGILE RESPONSE AREAS Actuators Feedback loops
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
AGILE RESPONSE EXAMPLES
• Failover
• File integrity monitoring
• Information capture
• Long term heuristics
• Maintenance
• State estimation
• Tuning
• While listing
• ARP correction
• Block IP, protocol, session, application
• Failover
• File integrity monitoring
• Long term heuristics
• Scale up/down
Proactive Reactive
BOOM
Actuators Feedback loops
AGILE RESPONSE RISK TYPES
• Risk associated with the threat and
risk associated with the response
• Some response actions pose risk
regardless if it is run by a human or a
machine
• We likely already know how to assess
the risk, but require modifications to
existing tools or processes.
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
Actuators Feedback loops
AGILE RESPONSE RISK METRICS
• There is an inherent risk
with automation.
• Many types of metrics
should be considered
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
Actuators Feedback loops
AGILE RESPONSE RISK METRICS
• There is an inherent risk
with automation.
• Many types of metrics
should be considered
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
Actuators Feedback loops
AGILE RESPONSE RISK METRICS
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
Effectiveness
59%
Does the response work?
Trustworthy
90
75
80
Can I trust source?
Does the response work?
Was it tested in our lab?
Was it tested by the vendor or other 3rd party?
What is the source of the info?
Was it digitally signed?
Reputation factor
Actuators Feedback loops
AGILE RESPONSE RISK METRICS
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
Must I act now?
If I don’t act now, will the opportunity close?
Will the response action be different later?
Can I roll back if this breaks?
Window of Opportunity
00:00:10
Must I act now?
Reversibility
Yes
Can I roll back?
Cost of Operational Degradation
$1M Loss of revenue or decline in company value
Are there fines or loss revenue?
Actuators Feedback loops
AGILE RESPONSE RISK METRICS
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
Is safety compromised?
Magic smoke?
Affects to health or human welfare?
Are networks affected?
Will this delete data?
Does this expose our network to other risks?
Physical Impact
Is safety compromised?
Digital Impact
95%
Is my network affected?
Actuators Feedback loops
AGILE RESPONSE RISK METRICS
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
Is reliability compromised?
Diversity of systems?
Can the backup system handle the entire load?
Will I have to report this to NERC?
Will I be fined?
Do we have enough data to prove this is the best option?
Redundancy Impact
N+1
Will it affect reliability?
Regulatory Impact
No
Will I have to report to NERC?
Actuators Feedback loops
SUMMARY
• What is an agile response system
• Uses for an Agile response system
• Don’t solely focus on right of boom
• Plenty of opportunity for automation in the asset lifecycle
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
Actuators Feedback loops
Common data
structures
Machine to machine
communications Contextual awareness
SUMMARY
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
• Categorize response types
• Use your individual comfort level with automated responses
• Use metrics to determine the risk of the agile response
• Measure effectiveness of system and learn
Actuators Feedback loops
Common data
structures
Machine to machine
communications Contextual awareness
20+ years security & product experience.
Advocacy on security appears in CNBC, Forbes, and NYT.
Previously CloudPassage, nCircle, and Tripwire.
San Francisco
Andrew Storms, CISSP
VP, Product at New Context
@St0rmz
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019
REFERENCES
2019 Data Breach Investigations Report
https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf
California Energy Systems for the 21st Century
https://www.llnl.gov/news/california-utilities-partner-lawrence-livermore-improve-states-energy-
grid
CIS Control 1. Inventory and Control of Hardware Assets
https://www.cisecurity.org/controls/inventory-and-control-of-hardware-assets/
The Cybersecurity Illusion: The Emperor Has No Clothes
https://go.attackiq.com/PR-2019-PONEMON-REPORT_LP.html
Identifying Critical Cyber Assets
https://www.nerc.com/docs/cip/sgwg/Critcal_Cyber_Asset_ID_V1_Final.pdf
Machine Actionable Indicators of Compromise
Doug Rhoades, Southern California Edison
The new Department of Defense (DOD) guide for achieving and assessing RAM
(reliability, availability, and maintainability)
Y. Jackson ; P. Tabbagh ; P. Gibson ; E. Seglie
https://ieeexplore.ieee.org/document/1408329
NIST Special Publication 800-37: Risk Management Frameworks for Information
Systems and Organizations
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
Sharable & Implementable Threat Intelligence
Rita Foster and Jed Haile, Idaho National Laboratory
John Tran, Southern California Edison
Andrew Storms, New Context
Structured Threat Information Expression
https://oasis-open.github.io/cti-documentation/
Structured Threat Information Graph
https://github.com/idaholab/STIG
New Context Services, Inc.
EnergySec Security & Compliance Summit 2019

Más contenido relacionado

La actualidad más candente

application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
sciccone
 

La actualidad más candente (19)

Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019
 
Integration of cyber security incident response with IMS -- an approach for E...
Integration of cyber security incident response with IMS -- an approach for E...Integration of cyber security incident response with IMS -- an approach for E...
Integration of cyber security incident response with IMS -- an approach for E...
 
Mapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information SecurityMapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information Security
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
Cybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automationCybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automation
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 

Similar a Utility Networks Agile Response Capabilities - New Context at EnergySec 2019

SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security Summit
Nicole Waddell
 
How to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsHow to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS Environments
Info-Tech Research Group
 
PMCD Fall 2015 Newsletter
PMCD Fall 2015 NewsletterPMCD Fall 2015 Newsletter
PMCD Fall 2015 Newsletter
Sandeep Raju
 

Similar a Utility Networks Agile Response Capabilities - New Context at EnergySec 2019 (20)

Be wp cybersmart_buildings
Be wp cybersmart_buildingsBe wp cybersmart_buildings
Be wp cybersmart_buildings
 
Be wp cybersmart_buildings (1)
Be wp cybersmart_buildings (1)Be wp cybersmart_buildings (1)
Be wp cybersmart_buildings (1)
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security Summit
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a Product
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Open service risk correlation
Open service risk correlationOpen service risk correlation
Open service risk correlation
 
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
 
Walls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application SecurityWalls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application Security
 
How to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsHow to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS Environments
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
PMCD Fall 2015 Newsletter
PMCD Fall 2015 NewsletterPMCD Fall 2015 Newsletter
PMCD Fall 2015 Newsletter
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 

Último

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Utility Networks Agile Response Capabilities - New Context at EnergySec 2019

  • 1. New Context protects data and the movement of data in highly regulated industries PREPARED FOR: Using Security Orchestration in Utility Networks to create an Agile Threat Response and Enhance Resiliency EnergySec Security and Compliance Summit 2019 August 19-21, 2019
  • 2. 20+ years security & product experience. Advocacy on security appears in CNBC, Forbes, and NYT. Previously CloudPassage, nCircle, and Tripwire. San Francisco Andrew Storms, CISSP VP, Product at New Context @St0rmz New Context Services, Inc. EnergySec Security & Compliance Summit 2019
  • 3. https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf The time from the attacker’s first action in an event chain to the initial compromise of an asset is typically measured in minutes Breach 00:00:00 56% of breaches took months or longer to discover Detection 56% New Context Services, Inc. EnergySec Security & Compliance Summit 2019 53 % have no idea how well the tools and software implemented in corporate networks are performing.Functional 53% https://go.attackiq.com/PR-2019-PONEMON-REPORT_LP.html 63% said they have experienced a security control reporting a threat blocked when in reality, the tool failed to stop malicious behavior.Failure 63% Speed Measure and Learn Speed to assess and react is key Humans may take too long to analyze the situation Humans don’t scale well against machines Trust but verify
  • 4. New Context Services, Inc. EnergySec Security & Compliance Summit 2019 Agile Response System System Components Response Types Risks Metrics TOPICS
  • 5. New Context Services, Inc. EnergySec Security & Compliance Summit 2019
  • 6. New Context Services, Inc. EnergySec Security & Compliance Summit 2019 TERMINOLOGY • Indicators Things I’m looking for Egress traffic on port 666 • Observables Things I saw Traffic on port 666 src myIP dest outsideIP • Actuator Component that is responsible for taking action Block traffic at firewall on port 666 STOTS FIT STIG TMA
  • 7. AGILE RESPONSE SYSTEM COMPONETS New Context Services, Inc. EnergySec Security & Compliance Summit 2019 Automation Machine to machine communications Interoperate Common data structures Adapt behaviors Contextual awareness Secure and trusted Confidentiality, integrity, and availability Measure and improve Feedback loops Take action Actuators
  • 8. AGILE RESPONSE SYSTEM COMPONETS • Structured Threat Observable Tool Set (STOTS) • Structured Threat Information Expression (STIX) • STOTS focus on surgical detection and response for a specific threat, enabling cyber defenders to be more agile in defense against cyber adversaries. • Detection and monitoring that can be used by the most advanced and the most basic cyber personnel to find IOCs for configuration specific systems. Common data structures Creative Destruction and Agnostic Detection using a Structured Threat Observable Tool Set Bryce McClurg | Idaho National Laboratory New Context Services, Inc. EnergySec Security & Compliance Summit 2019 Machine to machine communications Contextual awareness
  • 9. AGILE RESPONSE SYSTEM COMPONETS • Use of STIX and ELK to quickly discover potentially malicious activity. • Vendor agnostic means to achieve these goals in addition to providing a means to share these findings. • Leveraging off the shelf big data tools such as Elasticsearch. • Facilitate rapid querying of complex STIX observables. STIX and Big Data Christian O. Hunt | New Context Services New Context Services, Inc. EnergySec Security & Compliance Summit 2019 Common data structures Machine to machine communications Contextual awareness
  • 10. AGILE RESPONSE SYSTEM COMPONETS • Threat Monitoring Appliance (TMA) • Test harness toolset for STIX based observables and indicators. • Runs inside OT networks and executes the responses • Developed by New Context as part of the California Energy for the 21st Century (CES-21) project. New Context Services, Inc. EnergySec Security & Compliance Summit 2019 Actuators Feedback loops
  • 11. New Context Services, Inc. EnergySec Security & Compliance Summit 2019 • Address the asset entire lifecycle with automation • 3/4ths of the PF curve happen prior to failure • Take an automation-first approach • Capture metrics from day 1 AGILE RESPONSE AREAS Actuators Feedback loops
  • 12. New Context Services, Inc. EnergySec Security & Compliance Summit 2019 AGILE RESPONSE EXAMPLES • Failover • File integrity monitoring • Information capture • Long term heuristics • Maintenance • State estimation • Tuning • While listing • ARP correction • Block IP, protocol, session, application • Failover • File integrity monitoring • Long term heuristics • Scale up/down Proactive Reactive BOOM Actuators Feedback loops
  • 13. AGILE RESPONSE RISK TYPES • Risk associated with the threat and risk associated with the response • Some response actions pose risk regardless if it is run by a human or a machine • We likely already know how to assess the risk, but require modifications to existing tools or processes. New Context Services, Inc. EnergySec Security & Compliance Summit 2019 Actuators Feedback loops
  • 14. AGILE RESPONSE RISK METRICS • There is an inherent risk with automation. • Many types of metrics should be considered New Context Services, Inc. EnergySec Security & Compliance Summit 2019 Actuators Feedback loops
  • 15. AGILE RESPONSE RISK METRICS • There is an inherent risk with automation. • Many types of metrics should be considered New Context Services, Inc. EnergySec Security & Compliance Summit 2019 Actuators Feedback loops
  • 16. AGILE RESPONSE RISK METRICS New Context Services, Inc. EnergySec Security & Compliance Summit 2019 Effectiveness 59% Does the response work? Trustworthy 90 75 80 Can I trust source? Does the response work? Was it tested in our lab? Was it tested by the vendor or other 3rd party? What is the source of the info? Was it digitally signed? Reputation factor Actuators Feedback loops
  • 17. AGILE RESPONSE RISK METRICS New Context Services, Inc. EnergySec Security & Compliance Summit 2019 Must I act now? If I don’t act now, will the opportunity close? Will the response action be different later? Can I roll back if this breaks? Window of Opportunity 00:00:10 Must I act now? Reversibility Yes Can I roll back? Cost of Operational Degradation $1M Loss of revenue or decline in company value Are there fines or loss revenue? Actuators Feedback loops
  • 18. AGILE RESPONSE RISK METRICS New Context Services, Inc. EnergySec Security & Compliance Summit 2019 Is safety compromised? Magic smoke? Affects to health or human welfare? Are networks affected? Will this delete data? Does this expose our network to other risks? Physical Impact Is safety compromised? Digital Impact 95% Is my network affected? Actuators Feedback loops
  • 19. AGILE RESPONSE RISK METRICS New Context Services, Inc. EnergySec Security & Compliance Summit 2019 Is reliability compromised? Diversity of systems? Can the backup system handle the entire load? Will I have to report this to NERC? Will I be fined? Do we have enough data to prove this is the best option? Redundancy Impact N+1 Will it affect reliability? Regulatory Impact No Will I have to report to NERC? Actuators Feedback loops
  • 20. SUMMARY • What is an agile response system • Uses for an Agile response system • Don’t solely focus on right of boom • Plenty of opportunity for automation in the asset lifecycle New Context Services, Inc. EnergySec Security & Compliance Summit 2019 Actuators Feedback loops Common data structures Machine to machine communications Contextual awareness
  • 21. SUMMARY New Context Services, Inc. EnergySec Security & Compliance Summit 2019 • Categorize response types • Use your individual comfort level with automated responses • Use metrics to determine the risk of the agile response • Measure effectiveness of system and learn Actuators Feedback loops Common data structures Machine to machine communications Contextual awareness
  • 22. 20+ years security & product experience. Advocacy on security appears in CNBC, Forbes, and NYT. Previously CloudPassage, nCircle, and Tripwire. San Francisco Andrew Storms, CISSP VP, Product at New Context @St0rmz New Context Services, Inc. EnergySec Security & Compliance Summit 2019
  • 23. REFERENCES 2019 Data Breach Investigations Report https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf California Energy Systems for the 21st Century https://www.llnl.gov/news/california-utilities-partner-lawrence-livermore-improve-states-energy- grid CIS Control 1. Inventory and Control of Hardware Assets https://www.cisecurity.org/controls/inventory-and-control-of-hardware-assets/ The Cybersecurity Illusion: The Emperor Has No Clothes https://go.attackiq.com/PR-2019-PONEMON-REPORT_LP.html Identifying Critical Cyber Assets https://www.nerc.com/docs/cip/sgwg/Critcal_Cyber_Asset_ID_V1_Final.pdf Machine Actionable Indicators of Compromise Doug Rhoades, Southern California Edison The new Department of Defense (DOD) guide for achieving and assessing RAM (reliability, availability, and maintainability) Y. Jackson ; P. Tabbagh ; P. Gibson ; E. Seglie https://ieeexplore.ieee.org/document/1408329 NIST Special Publication 800-37: Risk Management Frameworks for Information Systems and Organizations https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf Sharable & Implementable Threat Intelligence Rita Foster and Jed Haile, Idaho National Laboratory John Tran, Southern California Edison Andrew Storms, New Context Structured Threat Information Expression https://oasis-open.github.io/cti-documentation/ Structured Threat Information Graph https://github.com/idaholab/STIG New Context Services, Inc. EnergySec Security & Compliance Summit 2019